Information Security Technology | |||||
Associate | TR-NQF-HE: Level 5 | QF-EHEA: Short Cycle | EQF-LLL: Level 5 |
Course Code: | BGT104 | ||||
Course Name: | Open Source Operating Systems | ||||
Semester: | Fall | ||||
Course Credits: |
|
||||
Language of instruction: | Turkish | ||||
Course Condition: | |||||
Does the Course Require Work Experience?: | No | ||||
Type of course: | Compulsory Courses | ||||
Course Level: |
|
||||
Mode of Delivery: | Face to face | ||||
Course Coordinator: | Öğr. Gör. RAMAZAN ŞEN | ||||
Course Lecturer(s): |
|
||||
Course Assistants: |
Course Objectives: | To be able to install, use and perform basic user operations of the Linux operating system, familarity with an open source operating system |
Course Content: | Computer system structure, operating systems overview, open source software, history and features of Linux, VMWare and Linux setup, file system, Linux directory structure, file types, Linux commands, Linux user management, file/directory permissions, user and group concepts, basic user and group operations |
The students who have succeeded in this course;
1) Installing the Linux operating system 2) Using Linux operating system 3) Ability to distinguish features of open source operating systems 4) Ability to perform file management |
Week | Subject | Related Preparation |
1) | Computer System Structure | |
2) | Operating Systems Overview | |
3) | Open Source Software | |
4) | Linux History, Features | |
5) | VMware, Linux Setup | |
6) | File System and Logic, File Types | |
7) | Linux Directory Structure | |
8) | Midterm Exam | |
9) | Linux Commands | |
10) | Linux Commands II | |
11) | Linux User Management | |
12) | File/Directory Permissions | |
13) | User and Group Concepts | |
14) | Basic User and Group Operations | |
15) | Final Exam | |
16) | Final Exam |
Course Notes / Textbooks: | Özkan, Y. (2004). İşletim Sistemleri: Linux İşletim Sistemi. Alfa Yayınları. |
References: | Keleştemur A. (2011). Pardus 2011. Kodlab Yayınları. Çetin, G. (2007). Pardus. Seçkin Yayınları. Güneş Çelik, K., Çetin, G. ve Metin, B. (2005). Linux Ağ Yönetimi. Seçkin Yayıncılık. Özkan, Y. (2004). İşletim Sistemleri: Linux İşletim Sistemi. Alfa Yayınları. |
Course Learning Outcomes | 1 |
2 |
3 |
4 |
||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Program Outcomes | ||||||||||||
1) Has knowledge and skills about creating program algorithms. | 3 | 1 | 1 | 1 | ||||||||
2) Can install and manage software and hardware required for end user security. | 1 | 1 | 1 | 1 | ||||||||
3) Can follow current security products. | 1 | 1 | 1 | 1 | ||||||||
4) It can manage both software and people in the environment against cyber attack incidents. | 1 | 1 | 1 | |||||||||
5) Installs the basic software and hardware of the computer. | 1 | |||||||||||
6) Installs and manages open source operating system and computer networks software. | ||||||||||||
7) It manages software, hardware and people in the environment in cyber attack incidents. | ||||||||||||
8) It creates and organizes the web page and database itself and can scan for vulnerabilities. | ||||||||||||
9) Creates, manages and organizes space on cloud platforms. | ||||||||||||
10) Firewall software also enables, manages and regulates the installation of hardware. | ||||||||||||
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | ||||||||||||
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field. |
No Effect | 1 Lowest | 2 Average | 3 Highest |
Program Outcomes | Level of Contribution | |
1) | Has knowledge and skills about creating program algorithms. | 1 |
2) | Can install and manage software and hardware required for end user security. | 1 |
3) | Can follow current security products. | 1 |
4) | It can manage both software and people in the environment against cyber attack incidents. | 1 |
5) | Installs the basic software and hardware of the computer. | 1 |
6) | Installs and manages open source operating system and computer networks software. | 1 |
7) | It manages software, hardware and people in the environment in cyber attack incidents. | 1 |
8) | It creates and organizes the web page and database itself and can scan for vulnerabilities. | 1 |
9) | Creates, manages and organizes space on cloud platforms. | 1 |
10) | Firewall software also enables, manages and regulates the installation of hardware. | 1 |
11) | It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions. | 1 |
12) | He/she has a good command of the professional, ethical, social and legal issues in his/her field. | 1 |
Semester Requirements | Number of Activities | Level of Contribution |
Midterms | 1 | % 40 |
Final | 1 | % 60 |
total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 40 | |
PERCENTAGE OF FINAL WORK | % 60 | |
total | % 100 |
Activities | Number of Activities | Workload |
Course Hours | 14 | 70 |
Homework Assignments | 2 | 12 |
Midterms | 1 | 11 |
Final | 1 | 15 |
Total Workload | 108 |